Download the catalogue here

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Multilevel security wikipedia , lookup

Cross-site scripting wikipedia , lookup

Malware wikipedia , lookup

Information security wikipedia , lookup

Post-quantum cryptography wikipedia , lookup

Information privacy law wikipedia , lookup

Computer and network surveillance wikipedia , lookup

Next-Generation Secure Computing Base wikipedia , lookup

Security and safety features new to Windows Vista wikipedia , lookup

Cracking of wireless networks wikipedia , lookup

Airport security wikipedia , lookup

Wireless security wikipedia , lookup

Unix security wikipedia , lookup

Distributed firewall wikipedia , lookup

Cyber-security regulation wikipedia , lookup

Microsoft Security Essentials wikipedia , lookup

Computer security wikipedia , lookup

Mobile security wikipedia , lookup

Security-focused operating system wikipedia , lookup

Cybercrime countermeasures wikipedia , lookup

Transcript
September
2013
Trend Micro
Total Product Catalogue
http://apac.trendmicro.com
Trend Micro Trademarks Notice
Trend Micro Incorporated, InterScan, InterScan VirusWall, ScanMail, ServerProtect, VirusWall, and WebProtect are trademarks of Trend Micro, registered in the U.S. and are trademarks in other
countries, and AppletTrap, ChipAwayVirus, Edoctor, Ehospital, Emanager, MacroTrap, OfficeScan, PC-Cillin, Trend Micro, Trend VCS, Web Trap and NeatSuite are trademarks of Trend Micro.
All other trademarks are the property of their respective owners.
Copyright © 1989-2013 Trend Micro Incorporated. All rights reserved.
P/N TOPE-SE-0005
Our VISION
Management
Eva Chen
A world safe for exchanging digital information
CEO & Co-Founder
Mahendra Negi
COO& CFO
The assurance of safety, for all people
The Internet society has now become commonplace.
However, a society that can use the Internet safely is certainly not commonplace.
Trend Micro has extensive experience and advanced technology to protect individuals and
companies from the threats of the information society.
We will consolidate all our strengths to confront these threats and continue to
provide a safe network society.
Steve Chang
Chairman & Founder
Akihiko Omikawa
Executive Vice President,
General Manager Japan Region,
Global Consumer Business Unit,
Global Service Business Unit
Traded
Tokyo Stock
Exchange 4704
ASIA-PACIFIC
Providing the reassurance of security, across borders.
Trend Micro responds to threats all around the world
with threat analysis network spreading globally.
Trend Micro is a multinational corporation from Japan that has reached beyond borders to become a transnational company.
In 1988, Trend Micro was founded in California in the United States, and in Japan from 1989.
Since then, Trend Micro has continued to grow steadily, and as a multinational corporation from Japan with activity bases located
around the world, has built up a network which continuously monitors worldwide and regional threats to quickly provide solutions
to customers.
Trend Micro Global Network
Ireland
UK
France
Germany
USA
11F, No.198 Sec. 2
Tun Hwa S. Road
Taipei, Taiwan (106)
+886-2-2378-9666
http://trendmicro.com/tw
Eva Chen
CEO & Co-Founder
Company Introduction & Global Map
Company Introduction & Global Map
Company Introduction & Global Map
(California)
Japan
China
USA
(Head Office)
(Texas)
Taiwan
Philippines
(Headquarters)
JAPAN
Shinjuku MAYNDS Tower
2-1-1 Yoyogi, Shibuya-ku
Tokyo, Japan 151-0053
+81-3-5334-3600
www.trendmicro.com/jp
Brazil
Development Sites
Major Overseas Bases
TrendLabs Philippine is granted the ISO 20000-1 2005
for the adherence to IT service excellence of its malware information,
detection cleanup and technical support services.
Japan
Our MISSION
Innovate to provide the best content security
that fits into the IT infrastructure
Providing the optimal solution, with constant innovation.
As the leader in content security, Trend Micro provides solutions
enabling a safe information society. This is Trend Micro’s mission.
In addition to the changing trends in threats, the emergence of cloud computing,
and the penetration of mobile PCs, there are also changes in the network environment.
Developing innovative products and services in order to protect valuable information
assets from unpredictable threats anytime, anywhere.
Our job is to continue to quickly provide optimal solutions
in response to this changing environment.
Therefore we are committed to constant innovation.
2
NORTH AMERICA
Head Office
10101 N. De Anza Blvd.
Cupertino, CA 95014
USA
408-257-1500
www.trendmicro.com
TrendLabs
Regional Trend Labs
LATIN AMERICA
Development Sites
Insurgentes Sur 813, Pisoll
Colonia Napoles
C.P. 03810 - Mexico D.F.
5255-3067-6000
www.trendmicro.com/la
Philippines
Overseas Subsidiary
EMEA
Business and Technology Park
Model Farm Road
Cork, Ireland
+353 21-7307-300
www.trendmicro.co.uk
Major Overseas Bases
(Headquarters)
Japan
USA
USA
Japan
Canada
Taiwan
Germany
UK
Germany
Taiwan
Ireland
China
China
India
France
Australia
Germany
China
China
(Beijing)
(Shanghai)
Taiwan
France
(Hong Kong)
India
Korea
Italy
UK
Australia
Canada
Thailand
Switzerland
Malaysia
Singapore
Brazil
New Zealand
Austria
Belgium
Netherlands
Denmark
UAE(Dubai)
Norway
Poland
Spain
Sweden
Turkey
Vietnam
Philippines
Egypt
USA
Ireland
Mexico
China
Ireland
UK
France
Brazil
Brazil
Panama
Russia
Indonesia
Saudi Arabia South Africa
3
Product Map
Trend Micro
Smart Protection
Network
Email
Reputation
Services
Trend Micro
Deep Security
Virus
FRS
WRS
Product Map
Web
Reputation
Service
File
Reputation
Service
Invade
“For the Cloud”
Scalable from Physical server to
Cloud environment
Customer Datacenter
Trend Micro
Product Map
ERS
“From the Cloud”
Virus
Virus
Spyware
Spam
Invade
Data Loss
Trend Micro
Deep Security
Trend Micro
InterScan Web Security
Virtual Appliance
Trend Micro
InterScan Messaging Security
Virtual Appliance
Virus
Web
Spyware Threats Phishing Data Loss
Medium – Enterprise Environment
Trend Micro
ARM
Trend Micro
Hosted Email Security
URL
Filtering Phishing
Virus
Spyware
Spam
Phishing
Router
Trend Micro
Collaboration Security
- ScanMail Suite for Microsoft Exchange
- PortalProtect
- Trend Micro IM Security
Virus
Spyware
Spam
Phishing Data Loss
Trend Micro
Deep Discovery
Virus
Spyware
Web
Threats Phishing
Spam
Trend Micro
ScanMail for Groupware
Firewall
Appliance for analyze suspicious
behavior in network and respond to
unknown threats
Virus
Trend Micro
Enterprise Security for Endpoints
Invade
Spam
Server
Storage
- OfficeScan
- ServerProtect for Windows/Linux
- Control Manager
- OfficeScan plug-in IDF
- OfficeScan plug-in Macintosh
Virus
Spyware
Phishing
Data Loss
Switch
Web
Spyware Threats
Small – Medium Environment
- ScanMail Suite for Microsoft Exchange
- ScanMail Suite for Lotus Domino
Trend Micro
Network VirusWall
Enforcer
Network
Quarantine Virus
Data Loss
Trend Micro
Worry-Free Business Security
Trend Micro
ServerProtect
Series
Virus
Spyware
Spam
Management
Server
Mobile
URL
Web
Threats Phishing Filtering Data Loss Security
Virus
Antimalware
Trend Micro Product Matrix
Products
Categories
Antivirus
For Web threats
URL
Web
reputation filtering
Antispam
Encryption
Antispam
Endpoint
Email
Encryption Data Loss Mobile
Firewall
Prevention security encryption encryption
Data Protection
Virtualization
Vulnerability / Intrusion
IDS / IPS
FIM
Log
inspection
VDI
Categories
Enterprise Security for Endpoints Standard
Collaboration Security
Gateway Security
(Email / Web)
Anti-spam
Anti-Phishing
Unknown threats
Known threats
Restore
Analysis report
Quarantine
infected sources
Quarantine
ScanMail Suite for Lotus Domino
InterScan Web Security
Enterprise Security for Gateways
ServerProtect Linux
ServerProtect NetApp
Enterprise Security for Enterprise and Mail Servers
Products
Categories
ServerProtect EMC
Security Suites
Anti-Phishing
Hosted Email Security
ServerProtect NT/NW
Server /
Storage Security
URL filtering
InterScan Messaging Security
Worry Free Business Security Standard
Deep Security
Web reputation
PortalProtect
Worry Free Business Security Advanced
Worry Free Business Security Services
Antivirus
Data Loss
Prevention
Data Loss
Prevention
ScanMail Suite for Microsoft Exchange
Enterprise Security for Endpoints Advanced
Endpoint Security
Products
Anti-spam
For Web threats
Anti-malware
Network Security
Enterprise Security Suite
Behavior
monitoring
Deep Discovery
Network VirusWall Enforcer
Enterprise Security and Data Protection
4
Cloud Security
SecureCloud
Offline Security
Portable Security
Data Protection
Enterprise Data Protection
Anti-malware
Categories
Mobile Security
Products
Antivirus
For Web threats
Web reputation
URL filtering
Vulnerability /
Intrusion
Data Loss Prevention
Encryption
Device control
Remote lock
Remote wipe
Firewall
Mobile Security
5
Endpoint Security
Endpoint and Suites
Endpoint Security
Secure your endpoints, both on and off the network, with award-winning
protection including: anti-malware, web reputation technology to block
access to malicious websites, and HIPS protection. Powered by Trend Micro
Smart Protection Network cloud-based security, pattern files are managed
in the cloud and not on your endpoints to free computing resources and
optimize performance. Further customize your protection with add-on
options for data protection, mobile security, and desktop virtualization—all
coordinated through a single management console.
FILE SERVERS
OfficeScan
ServerProtect for Microsoft
Windows / Novell Netware
ServerProtect for Linux
CLIENTS
OfficeScan Endpoint Security
with plug-in modules:
Intrusion Defense Firewall
Security for Mac
Virtual Desktop Infrastructure(VDI)
CENTRALIZED
MANAGEMENT
Control Manager
Enterprise Security Suite
Trend Micro Enterprise Security Suite is a tightly integrated
suite of products that secure your network from gateway to
endpoint. With comprehensive threat protection and
centralized management, you can close the security gaps
while decreasing costs and complexity. Powered by Trend
Micro Smart Protection Network cloud-based security, this
end-to-end suite delivers global threat intelligence and faster
performance.
FILE SERVERS
Advantages
SMART: Get consistent security that delivers proactive protection across all endpoints
Simple: Increase security at lower costs with a consolidated, cloud-client architecture and simplified management
Security That Fits: Streamline administration by enforcing threat protection policies from a single console
OfficeScan Endpoint Security
ServerProtect for Microsoft
Windows / Novell Netware
ServerProtect for Linux
CENTRALIZED
MANAGEMENT
Control Manager
COMPARISON CHART
Enterprise
Security for
Endpoints
OfficeScan Plug-Ins
OfficeScan
Intrusion Defense
Firewall
Security for Mac
ServerProtect
for Windows,
NetWare, Linux
VDI
Trend Micro
Control Manager
Standard
Standard
Advanced
Advanced
MAIL SERVERS
InterScan Messaging Security
InterScan Web Security
Enterprise Security for Endpoints and Mail Servers
Trend Micro Enterprise Security for Endpoints and Mail
Servers is an integrated, centrally managed suite that delivers
adaptive threat protection with award-winning anti-malware,
antispam, host intrusion prevention (HIPs), web reputation,
and optional data security. This suite is powered by Trend
Micro Smart Protection Network cloud-based security for
global threat intelligence and faster performance. Reduce
risks and costs with a single solution offering unified
management of integrated security across enterprise
desktops, laptops, file servers, and mail servers.
FILE SERVERS
OfficeScan
ServerProtect for Microsoft
Windows / Novell Netware
ServerProtect for Linux
ScanMail Suite for Lotus Domino
ScanMail Suite for
Microsoft Exchange
ScanMail Suite for
Lotus Domino
ServerProtect for Microsoft Windows / Novell Netware
ServerProtect for Linux
Minimizes Complexity
Reduces time to acquire, deploy, and manage with
integrated solution
Streamlines administration with web-based centralized
management
CLIENTS
OfficeScan Endpoint Security
with plug-in modules:
Intrusion Defense Firewall
Security for Mac
Virtual Desktop Infrastructure(VDI)
Platform Coverage
Advantage
GATEWAY
InterScan Messaging Security Virtual Appliance
VMware
Virtualized email gateway security stops spam and email threats
InterScan Web Security Virtual Appliance
VMware
Virtualized web gateway security blocks web threats and includes URL filtering
Windows
Blocking spam, malware and spyware at the mail server
Windows, Linux
Blocking spam, malware and spyware at the mail server
MAIL SERVER
ScanMail Suite for Microsoft Exchange
ScanMail Suite for Lotus Domino
CLIENTS
OfficeScan Endpoint Security with plug-in modules:
Intrusion Defense Firewall
Security for Mac
Virtual Desktop Infrastructure(VDI)
CENTRALIZED
MANAGEMENT
Control Manager
Platform Coverage
FILE SERVER
OfficeScan
ServerProtect for Microsoft Windows / Novell Netware
Advantage
Windows
Blocking spam and spyware at the mail server
Windows, Linux
Blocking spam and spyware at the mail server
FILE SERVER
OfficeScan
Multilayered Protection
MAIL SERVERS
MAIL SERVER
ScanMail Suite for Microsoft Exchange
Maximizes Protection
Reduces risk with comprehensive multilayered,
multi-threat protection
Delivers immediate protection with in-the-cloud
threat intelligence
Improves productivity with #1 rated spam blocking and
web filtering
Lowers Costs
Lowers endpoint infection rates by 62%
Slashes IT security management costs by 40%
Maximum Protection and Minimum Complexity across Protections Points and Platforms
Maximum Protection across Endpoints and Mail Servers
Multilayered Protection
ScanMail Suite for
Microsoft Exchange
ScanMail Suite for
Lotus Domino
GATEWAY
Advantages
Endpoint Security
Enterprise Security for Endpoints Advanced
Enterprise Security for Endpoints Standard
ServerProtect for Linux
Windows, NetWare
Linux
Secures Windows servers
Secures Windows and NetWare file servers
Windows, NetWare
Linux
Secures Windows servers
Secures Windows and NetWare file servers
Secures Linux file servers
CLIENT / MOBILE DEVICE
OfficeScan
Intrusion Defense Firewall
Data Loss Prevention
Security for Mac
Windows
Windows
Windows
Secures Windows clients
Windows
__
Proactive HIPS and vulnerability shielding
Apple Macintosh
Protect your sensitive data
Protects Macintosh clients from malware and blocks malicious websites
MANAGEMENT
Control Manager Advanced
Windows
Centrally manages security
Secures Linux file servers
CLIENT
OfficeScan
Intrusion Defense Firewall
Security for Mac
VDI
Windows
Secures Windows clients
Windows
Proactive HIPS and vulnerability shielding
Apple Macintosh
__
Protects Macintosh clients from malware and blocks malicious websites
Secure virtual desktop environment
MANAGEMENT
Control Manager Advanced
6
Windows
Centrally manages security
7
Endpoint Security
OfficeScan plug-ins
Endpoint and Suites
Endpoint Security
Trend Micro Enterprise Security and Data Protection is an
integrated suite of products that secure your network from
gateway to mobile devices for complete end user protection.
This comprehensive suite combines multi-layer adaptive
threat protection with Trend Micro Enterprise Data Protection
to help you efficiently mitigate the risks of attacks and data
breaches across the spectrum of end-user platforms, from
smartphones to tablets, and laptops to removable drives.
Trend Micro Enterprise Data Protection simplifies data
security in today’s complex mobile environments by
integrating data loss prevention (DLP), encryption, mobile
security, and mobile device management (MDM) with your
existing Trend Micro security suite. By combining threat and
data protection in a flexible, centrally-managed solution,
it lowers the cost and effort to deploy and manage while
closing critical security and compliance gaps—for complete
end-user protection across endpoints, mobile devices, email,
and gateway.
Solution
FILE SERVERS
OfficeScan
ServerProtect
Integrated DLP
ScanMail Suites
Email Encryption
Integrated DLP
Data Loss Prevention Module
Intrusion Defense Firewall
The DLP plug-in is an option for OfficeScan customers to gain
visibility and control into how sensitive data is being handled.
Real-time scanning of users will detect when sensitive data is
being copied, moved, emailed, pasted or uploaded and
appropriate action can be taken such as blocking, reporting or
warning.
As a plug-in for OfficeScan within Trend Micro Enterprise
Security for Endpoints, Intrusion Defense Firewall
supplements highly effective OfficeScan client-level security
with network-level Host Intrusion Prevention System (HIPS).
Advantages
Data privacy and compliance
Can be deployed immediately / easily
GATEWAY
InterScan Massaging Security
InterScan Web Security
Integrated DLP
Components
Data protection
Trend Micro Integrated Data Loss Prevention
Trend Micro Mobile Security
Trend Micro Endpoint Encryption
Trend Micro Email Encryption Gateway
Centralized Management
Trend Micro Control Manager
Gateway Protection
InterScan Messaging Security
InterScanWeb Security
Mail Servers Protection
ScanMail Suite for Microsoft Exchange
ScanMail Suite for Lotus Domino
Mail Servers Protection
OfficeScan Endpoint Security
Server Protect for Microsoft Windows / Novell Netware
ServerProtect fo Linux
Endpoint Protection
OfficeScan Endpoint Security
Intrusion Defense Firewall
Trend Micro Security for Mac
VDI Security
CENTRALIZED
MANAGEMENT
Control Manager
CLIENTS
OfficeScan
Intrusion Defense
Firewall
Security for Mac
VDI Security
Mobile Security
Endpoint Encryption
Integrated DLP
OfficeScan Virtual Desktop
Infrastructure
Enterprise
Data Protection
Protects endpoints with minimal impact on network
throughput, performance, or user productivity.
Blocks attacks before they enter the endpoint’s
application and execution layer.
Provides protection before patches are deployed .
Security for Macintosh
Built specifically to handle the rigors of virtual desktop
environments, Trend Micro Virtual Desktop Security maximizes
protection for a broad spectrum of virtual desktop scenarios.
Advantages
Enterprise Security
and Data Protection
Advantages
Endpoint Security
Enterprise Security and Data Protection
Enterprise Data Protection
MAIL SERVERS
As a plug-in for OfficeScan Trend Micro Security for Mac leverages
Trend Micro Smart Protection Network to proactively limit exposure
to threats. Real-time, in-the-cloud Web Reputation technology
prevents users and applications from accessing malicious web
content.
Advantages
Agentless anti-malware
No security agent in the VM
Leverage VMware vShield APIs
VDI optimized agents
Prevent resource contention
Cleans, scans memory and monitors behavior.
Blocks malware for all systems, including both Mac OS and
Windows.
Mobile Security
Trend Micro Mobile Security enables businesses to extend
protection beyond traditional PCs to secure mobile devices
and data for the smartphone and tablet platforms your
employees are demanding.
This solution lets organizations reduce costs by providing a
single point of visibility and control for device management
and security.
It protects data and limits data loss incidents by enforcing the
use of passwords, encrypting data, and remotely wiping data
from lost or stolen devices.
iPhone / iPad
User
Advantages
Threat Protection
Malware
Spyware
Web threats
Reduced Operational Costs
Limit Data Loss
Reduced Security Risk
Android
User
BlackBerry
User
Monitor
Windows
Mobile
User
Manager
Control
8
9
Endpoint Security
Cloud Security
Worry Free
SecureCloud
Endpoint Security
Provides fast, effective, and simple protection against web viruses, cybercriminals, and data loss, so you can
focus on your business instead of worrying about Internet security. Worry-Free is ranked #1 in independent tests
at blocking Internet threats BEFORE they reach your PCs; Mac computers; file and mail servers — increasing
protection, while preventing computer slow down.
Viruses
Mobile Security
Advantages
Web Threat Protection
Smart Scan
Scans faster and updates quicker
Data Loss Prevention
Comprehensive spam prevention
Device Control
Zero update effort (Services only)
URL filtering
Spam mails
Data loss
Phishing
Spyware
UNIQUE ADVANTAGES
Web threats
Worry-Free
Business
Security
Services
Worry-Free
Business
Security
Standard
Worry-Free
Business
Security
Advanced
More companies are turning to cloud computing and
virtualization to provide rapid provisioning, agility, and cost
savings.
However, these benefits also introduce privacy and security
risks-businesses may not always know where their data is or
who can access it. Trend Micro SecureCloud provides
distinctive data protection for cloud and virtual environments
using encryption with policy-based key management and
unique server validation.
This protection safely and easily secures sensitive data stored
with leading cloud service providers, including Amazon EC2,
Dell, Eucalyptus, and NTT America, as well as VMware vCloud
and any virtual environment.
With SecureCloud, you can protect sensitive information in
cloud and virtual environments from theft, unauthorized
exposure, or unapproved geographic migration to other data
centers.
This protection helps support internal governance and ensure
compliance with regulations like HIPAA, HITECH,
Sarbanes-Oxley, GLB and PCI DSS. SecureCloud also features
FIPS 140-2 certification to support government agencies and
companies that mandate high security standards.
Web threat protection stops viruses and threats from the web before they reach your business
Intuit QuickBooks protection
Smart Feedback – faster identification and response to new threats
Integrated fake antivirus removal tool
Support for IPv6 Cloud platform
Trend Micro
SecureCloud
agent
PLATFORMS
PCs, laptops, Windows servers
Windows 8 compatible Virtualization (VMware and Microsoft)
Mac clients (iMacs and MacBooks) and servers
Android Devices
VM
Hy
pe
VM
Features & Advantages
Advanced Security Techniques
Features FIPS 140-2 certification and FIPS approved AES
encryption
Encrypts and decrypts information in real time,
so data at rest is always protected
Applies whole volume encryption to secure all data,
metadata, and associated structures without impacting
application functionality
Access and Authentication Controls
Employs role-based management to help ensure proper
separation of duties
Automates key release and virtual machine authorization
for rapid operations or requires manual approval for
increased security
Offers cloud provider credential rotation
Policy-driven Key Management
Uses identity- and integrity-based policy enforcement to
ensure only authorized virtual machines receive keys and
access secure volumes
Enables the use of policies to determine when and where
information is accessed
Robust Auditing, Reporting, and Alerting
Logs actions in the management console for audit purposes
Provides detailed reporting and alerting features with
incident-based and interval-based notifications
Authentication for key deployment done by
rule base policy per VMs.
VM
rvi
so
r
Random
session key
over SSL
ANTIVIRUS AND WEB SECURITY
Defends against viruses, spyware, bots, rootkits
Advanced URL filtering blocks access to inappropriate websites
(with blacklist feature)
Shared Storage
CENTRALIZED MANAGEMENT
Intuitive web console
Management server location
DATA PROTECTION
Device control, controls access to USB drives and other attached devices to prevent
data loss and block threats.
Data loss prevention via business email messages, accidental or deliberately sent
MESSAGING SECURITY AND ANTISPAM
Users
Hosted
On Premise
Access VM
On Premise
Kernel level encryption on writing data.
Encryption will be done for per volumes
which connects to virtual instance server OS.
Key will be deployed per volumes
Scans and blocks spam from entering POP3 mail accounts
Includes Hosted Email Security-Inbound Filtering that stops spam and email-based
viruses before they reach mail servers
Threat protection and multi-layer antispam for Microsoft Exchange Servers
10
11
Cloud Security
Worry-Free Business Security Advanced
Worry-Free Business Security Standard
Worry-Free Business Security Services
Server/Storage Security
Deep Security and ServerProtect series
ServerProtect for Microsoft Windows and Novell NetWare
Server/Storage Security
Trend Micro Deep Security provides a comprehensive
server security platform designed to protect your
virtualized data center from data breaches and business
disruptions while enabling compliance. This agentless
solution simplifies security operations while accelerating
the ROI of virtualization and cloud projects.
Tightly integrated modules easily expand the platform to
ensure server, application, and data security across
physical, virtual, and cloud servers, as well as virtual
desktops. So you can custom tailor your security with any
combination of agentless and agent-based protection,
including anti-malware, web reputation, firewall, intrusion
prevention, integrity monitoring, and log inspection. The
result is an adaptive and efficient server security platform
that protects mission-critical enterprise applications and
data from breaches and business disruptions without
expensive emergency patching.
Features
Anti-Malware
Integrity Monitoring
Web Reputation
Intrusion Detection and Prevention
Bidirectional Stateful Firewall
Log Inspection
NEW Multi-Tenant
NEW Hypervisor Integrity Monitoring
NEW AWS and vCloud Integration
NEW vSphere 5.1 ready
NEW IPv6 ready
Advantages
Accelerate Virtualization, VDI, and Cloud ROI
Provides a lighter, more manageable way to secure VMs
Maximize Operational Cost Reductions
Prevent Data Breaches and Business Disruptions
Detects and removes malware in real time with minimal
performance impact
Achieve Cost-effective Compliance
Addresses major compliance requirements for PCI DSS 2.0,
as well as HIPAA, NIST, and SAS 70
Trend Micro
Deep Security
Virtual Appliance
PHYSICAL
VIRTUAL
VM
Deep Security
Agent
VM
CLOUD
VM
VM
VM
Deep Security
Agent
VM
VM
DESKTOP/LAPTOP
VM
Deep Security
Agent
Prevent viruses from spreading through your network by
blocking them before they reach the end user. Trend Micro
ServerProtect for Microsoft Windows and Novell NetWare
scans, detects and removes virus from files and compressed
files in real time. ServerProtect delivers 24x7 antivirus
support and protection with automatic, incremental virus
updates. Centralized management of servers via a Web-based
console simplifies network protection.
Advantages
Certified with Microsoft Windows Server 2000/2003 to
deliver high performance, reliability, security,
scalability and availability
Enables real-time, high-performance scanning with
minimal impact to servers
ServerProtect Linux
Protect your Linux file servers from becoming unwitting hosts
for viruses, trojans, bots and a full range of other malware.
Trend Micro ServerProtect for Linux offers real-time
protection, high performance and low processing overhead,
and supports all common Linux distributions. ServerProtect
for Linux adds another powerful solution to your enterprise’s
security and compliance strategy.
Advantages
Prevents Linux servers from spreading threats to other
servers and personal computers
Maximizes performance and lowers processor overhead
with multi-threaded, kernel-based scanning
Server/Storage Security
Deep Security
ServerProtect for EMC
ServerProtect for NetApp
ServerProtect for Hitachi Data Systems
Trend Micro ServerProtect for Storage, the industry’s most
reliable, high-performing security solution for storage
platforms, safeguards your file storage systems by detecting
and removing viruses and spyware in real time.
Advantages
Integrates tightly with EMC Celerra, NetApp Filers or
Hitachi NAS.
Enables real-time, high-performance scanning with
minimal impact to servers and no impact to end users
Deep Security
Agent
2
Security
Profile
Scan request
Trend Micro ServerProtect
for EMC Celerra for NetApp
for Hitachi Data Systems
IT Infrastructure
Integration
Alerts
1
3
Access files
Scan result
NAS
Users
4
Allow/deny access
Report
Trend Micro NAS Security
Administrator
Trend Micro
Deep Security Manager
Security Center
Trend Micro NAS Security scans files on a scheduled basis and
can even scan files in real-time, protecting the data on the
NAS from the threat of virus.
Advantages
Pre-installed antivirus to the NAS, no installation required.
Real-time malware scanning.
This product is offered as embedded function in designated device distributed by selected vendors.
12
13
Collaboration Security
Groupware
ScanMail Suite for Microsoft Exchange
ScanMail Suite for Lotus Domino
IM Security for Microsoft Lync and Office Communications Server
ScanMail Suite
for Lotus Domino
ScanMail Suite for Microsoft Exchange not only stops
traditional spam and malware but also detects malicious
URLs, highly targeted attacks, and advanced persistent
threats (APTs).
With a combination of web, email, and file reputation, plus
exploit detection and sandboxing, ScanMail Suite is the most
comprehensive mail server security. It’s the enterprise-level
protection you need that you won’t get with other solutions.
ScanMail Suite for IBM Lotus Domino stops traditional email
threats with the correlated intelligence of Trend Micro Smart
Protection Network cloud-based security.
It also protects your data with optional Data Loss Prevention
and blocks targeted email attacks when integrated with Trend
Micro Deep Discovery Advisor. ScanMail and Deep Discovery
Advisor are both components of the Trend Micro Custom
Defense Solution. ScanMail Suite is an easy-to-manage
solution supporting nearly all Domino platforms.
Advantages
Advantages
Collaboration Security
Guards against APTs and highly targeted attacks
Blocks phishing emails with malware or bad web links
Prevents data loss and simplifies compliance
Cuts administration time in half
Speeds throughput—up to 57% faster than other solutions
Customizes protection against highly targeted attacks
Blocks phishing emails with malware or bad web links
Prevents data loss and simplifies compliance
Lowers administration with better controls and optimization
“Suspicious’’
ScanMail
Deep Discovery Advisor
Sandboxes
Anti-spam
Features & Advantages
Unique! Blocks malicious links—before delivery—using
Web Reputation
Identifies and blocks zero-day threats with proprietary
IntelliTrap technology
Stops more spyware, with dedicated inspection,
before it can infect PCs
Filters content to protect against data loss and undesirable
language
Reduces administration with tight platform integration and
robust central control
Enterprise Security for Communication and Collaboration
Trend Micro Communication & Collaboration Security
protects your Microsoft email, collaboration, and IM systems
by stopping threats in real time—before they can strike. The
unique cloud-client architecture of Trend Micro Smart
Protection Network powers real-time threat protections (like
Email and Web Reputation) that work in concert with leading
conventional content security technologies—allowing you to
connect without the heightened risk.
Collaboration Security
ScanMail Suite
for Microsoft Exchange
Secure your real-time IM communications by stopping
fast-moving attacks designed to spread malware, lure victims
to malicious sites, and steal data. Powered by Trend Micro
Smart Protection Network and its unique cloud-client
architecture, IM Security blocks links to malicious sites before
the links can be delivered. Signature-independent zero-day
security, leading antivirus, and new antispyware work
together to stop malware before any damage. Plus, flexible
content filtering ensures appropriate IM use and prevents
data theft.
Communication & Collaboration Security
Sandboxes
Feedback
Anti-phishing
Threat Analysis
Enhanced
Web Reputation
Antivirus
Threat Intellignce
Quarantine
Advanced Threat Scan
Adaptive Security Updates
Trend Micro and
third-party security products
Central
Management
Collaboration
Server
Mail
Server
Instant Messaging
Server
Trend Micro
Control
Manager
Trend Micro
PortalProtect
for Microsoft
SharePoint
Trend Micro
ScanMail Suite
for Microsoft
Exchange
Trend Micro
IM Security for
Microsoft Office
Communications
Server
PortalProtect for Microsoft SharePoint
Trend Micro PortalProtect secures your collaborations with a
dedicated layer of protection that guards against malware,
malicious links, and other threats that SharePoint
administrators often don’t know about. Its web reputation
technology blocks malicious links from entering your web
portals, while its powerful content filtering scans both the
files and web components of SharePoint.
14
Advantages
Protects SharePoint users and data
Stops the wide range of malicious files and URLs
Filters inappropriate content from social aspects of
SharePoint
Controls sensitive data for compliance and risk management
Takes half the time to manage
Scales to any deployment size
The integrated Data Loss Prevention protects your
sensitive data
15
Gateway Security
Gateways
InterScan Messaging Security Virtual Appliance
Enterprise Security for Gateways
Trend Micro InterScan Messaging Security stops traditional
threats in the cloud with global threat intelligence, protects
your data with data loss prevention and encryption, and
identifies targeted email attacks as part of a custom APT
defense. The hybrid SaaS deployment combines the privacy
and control of an on-premise virtual appliance with the
proactive protection of a cloud-based pre-filter service.
Keep your data confidential and your employees safe while interacting with rich Internet content. Trend Micro Enterprise Security
for Gateways integrates virtualized web and messaging gateway security—proven to maximize protection while minimizing
complexity and lowering total cost up to 40 percent.1 In-the-cloud web and email reputation combined with industry-leading
antispam, antivirus, and URL filtering provide multilayered, multi-threat protection that blocks malware, malicious links, and
unwanted content before they can enter your network. With real-time reporting, you’ll gain unprecedented visibility of current
web activity, enabling you to stop risky behavior immediately. Outbound filtering and email encryption* protect confidential data
and support compliance—for complete gateway security.
Advantages
Detect and block APTs and targeted attacks
Thwart targeted phishing attacks and advanced malware
Simplify data protection and encryption
Block more spam—proven #1 in independent tests
1 Osterman Research, Why You Should Consider Virtualization, February 2009
* Trend Micro Encryption for Gateway Add-on is an optional purchase
Viruses
Users
Trend Micro
Maximum Protection and Minimum Complexity at the Gateway
InterScan
Multilayered Protection
Anti-virus
Data loss
Anti-spyware
Spyware
InterScan Messaging Security Virtual Appliance
Virtualized email gateway security stops spam, phishing and email threats
Contents filtering
InterScan Web Security Virtual Appliance
Virtualized web gateway security blocks web threats and includes URL filtering
Advanced
Threat Detection
Trend Micro Encryption for Email Gateway
Virtualized email gateway security encrypts email content and file attachments
APT
Hosted Email Security
Trend Micro Hosted Email Security is a no maintenance
required solution that delivers continuously updated
protection to stop spam and viruses before they reach your
network.
InterScan Web Security Virtual Appliance
Faced with today's advanced Internet threats and the growing
use of cloud-based consumer applications in the workplace,
application visibility is essential to understanding network
risks. InterScan Web Security is a software virtual appliance
that combines application control with advanced anti-malware
scanning, real-time web reputation, and flexible URL filtering
to provide superior Internet threat protection.
Gateway Security
Advantage
GATEWAY
Advantages
Get instant visibility and control with Advanced
Reporting and Management
Stop web threats before they penetrate the perimeter
Lower your TCO
The integrated Data Loss Prevention protects your
sensitive data
Advantages
Helps you reclaim productivity and bandwidth
Helps free your time to implement critical business
initiatives
Gives you peace of mind
Gateway Security
Spam mail
Internet
Mails
Trend Micro
Hosted Email Security
Viruses
Trend Micro
Spam mail
InterScan
Anti-virus
Anti-spyware
Phishing
Data loss
Clean mails
Anti-phishing
URL filtering
Spyware
Users
URL filtering
Customers’ site
Web reputation
Advanced
Threat Detection
APT
16
17
Encryption
Endpoint Encryption
Email encryption Client
Endpoint Encryption encrypts data on a wide range of
devices—laptops, desktops, tablets, CDs, DVDs, USB drives and
any other removable media. This solution offers
enterprise-wide full disk, file/folder, and removable media
encryption, combined with granular port and device control to
prevent unauthorized access and use of private information.
A single management console allows you to manage both
hardware and software encryption—enterprise-wide—for
entire hard drives, specific files, folders, removable media,
and storage devices.
Trend Micro Email Encryption efficiently secures email delivered to anyone with an email address. Client-based encryption allows
the end user to select which emails should be encrypted by merely clicking a button on the desktop. This ability for end users to
encrypt specific emails with unique data complements policy-based encryption which automatically encrypts general content
types. Together they create a complete email encryption solution. Trend Micro Email Encryption Client is a software plug-in for
popular email clients that deploys without modifying existing business processes and integrates seamlessly with the existing email
infrastructure.
Features
Advanced Reporting & Auditing
Automate enforcement of regulatory compliance with
policy-based encryption
Receive detailed auditing and reporting by individual,
organizational unit, and device
Pre-Boot Multi-Factor Authentication
Gain flexible authentication, including fixed password,
CAC, PIV, Pin, and ColorCode®
Trigger lockout feature in response to incorrect
authentication attempts
Administrative Tools & Active Directory Integration
Leverage Active Directory and existing IT infrastructure
for deployment and management
Take the burden off IT staff by allowing users to change
and reset passwords and accounts.
Advantages
Maximize Platform Coverage for Data & Device Encryption
Encrypt private data with fully integrated full disk,
file folder, USB, and removable media encryption
Lower TCO with Centralized Policy Administration &
Key Management
Simplify operations with a unified data repository with
single management server and console
Simplify Remote Device Management
Maintain compliance and protect your data without
disrupting users in the event of a lost device or forgotten
password.
Manage policies and protect data on PCs, laptops, tablets,
USBs, CDs, DVDs
Users
Trend Micro
Email Encryption
Client
Internet
Hosted Central
Trust Authority
Users
Encryption for Email Gateway
Enterprise gateway encryption augments email security by providing policy-based encryption and integration with messaging
security infrastructure.
The solution provides simple deployment and administration without altering existing business processes. When combined with
content security, it enables enterprises to encrypt emails and attachments automatically, without having to rely on individual
users to secure private information.
Messaging Security
Gateway
Trend Micro
Endpoint Encryption
Full Disk Encryption
File Encryption
Level 2
Level 2
Level 2
Users
Internet
Encryption
Encryption
Key Features
Centralized policy and key management
FIPS 140-2 encryption certification
AES 256-bit encryption
Users
File and folder encryption
Removable media (CD/DVD/USB) encryption
Granular port and device control
Self-encrypting drive management
Full disk encryption
Network-aware pre-boot authentication
Trend Micro
Email Encryption
Gateway
Automatic Synchronization and sharing
Plug-ins Hosted Email Encryption for Hosted E-mail Security
This policy-based encryption service seamlessly integrates with the content filtering capabilities of Hosted Email Security to
identify particular types of content and encrypts emails when the rules are triggered.
* Must use Hosted Email Security with outbound content filtering. No additional hardware or software is required.
18
19
Network Security
Network, Data Loss Prevention
Deep Discovery solution
Custom Defense Services
Trend Micro Deep Discovery provides the network-wide
visibility, insight and control that enterprises and government
organizations need to reduce the risk of Advanced Persistent
Threats (APTs) and targeted attacks. Deep Discovery uniquely
detects and identifies evasive threats in real-time, and
provides the in-depth analysis and actionable intelligence
needed to prevent, discover and contain attacks against
corporate data.
Today’s most damaging attacks are targeted specifically at your people,
your systems, your vulnerabilities, and your data. Advanced persistent
threats (APTs) are stealthier and more sophisticated than ever, using
insidious social engineering techniques to quietly penetrate your
organization to deploy customized malware that can live undetected for
months. Then when you are least expecting it, cybercriminals can remotely
and covertly steal your valuable information—from credit card data to the
more lucrative intellectual property or government secrets—potentially
destroying your competitive advantage, or in the case of government even
putting national security at risk.
Command and Control callback blacklist local update
Sharing new C&C callback blacklist (IP addresses/URLs)
found during sandbox analysis to customer’s current security
solution to block the targeted attack communications.
APT & Targeted Attack Detection
Reduces the risk of damages and data loss from APTs
Network-Wide Visibility
Reveals and tracks your true security posture
Deep targeted attack insight and recommendation
Delivers real-time threat profiling and remediation information
Integration capability
Integrates results with the blocking device and exports as
security policies, that improves enterprise-wide threat
detection and prevention
Deep Discovery solution includes
1 .Deep Discovery Inspector
2.Deep Discovery Advisor
How Deep Discovery works
Attack Detection
Emails containing embedded document exploits
Drive-by downloads
Zero-day & known malware
Decode & decompress embedded files
Sandbox simulation of suspicious files
Browser exploit kit detection
Malware scan (Signature & Heuristic)
Suspect Communication
C&C communication for all malware: bots,
downloaders, data stealing, worms, and
blended threats
Backdoor activity by attacker
Destination analysis (URL, IP, domain, email, IRC
channel, …) via dynamic blacklisting, white listing
Smart Protection Network URL reputation
Communication fingerprinting rules
Attack Behavior
Malware activity: propagation, downloading,
spamming...
Attacker activity: scan, brute force, service exploitation...
Data exfiltration
Malicious Content
Rule-based heuristic analysis
Identification and analysis of usage of 100’ s of
protocols & apps including HTTP-based apps
Network Security
Attackers
Malicious Sites
Backdoors
Visualize
Deep Discovery
Advisor
Deep Discovery
Inspector
ANALYZE
ADAPT
Assessment
Analysis and
Advisory
Monitoring and
Alert
Attack mails
InterScan
Web Security
Virtual Appliance
InterScan
Messaging Security
Virtual Appliance
20
Investigation and
mitigation
Components
Advantages
Critical System Assessment
Onsite critical systems for their health check.
Provide assessment report and recommendations for breach prevention.
Network Assessment
Visibility of hidden malicious activities with one time assessment service deploying
Deep Discovery Inspector.
Monitoring network and endpoints.
Analyze
Monthly Advisory
Quarterly advisory meeting based on data collected through Deep Discovery.
Monthly Advisory report and recommendation based on data collected through Deep Discovery.
Adapt
Monitoring & Alert
24x7 monitoring through Deep Discovery.
Email and phone notification for potential risks.
Breach Investigation
Onsite investigation and analysis of suspected systems by the security experts.
System Cleanup
The tool to mitigate and cleanup compromised systems.
Clean up compromised systems on which Deep Discovery detects suspicious C&C activities.
Custom Signature SLO
Customized pattern files based on malicious files specifically collected in customer sites.
6 hours SLO.
Server farm
Respond
Inspection
Detection
RESPOND
Service components and advantages
Services
Deep Security
Analysis
Adapt
DETECT
Detect
Share local threats intelligence from Deep Discovery Advisor with
Trend Micro products and 3rd party security products to prevent
connections to malicious sites including C&C (Command & Control)
servers.
Respond
The Custom Defense Services is the solution that helps customers to
detect, analyze, adapt and respond to recent attacks represented by
targeted attack s and APTs.
Service overview
Detection Methods
Detect
Network Security
Advantages
Block
Network VirusWall
OfficeScan
21
Network Security
Security Management
Network, Data Loss Prevention
Network VirusWall Enforcer
Trend Micro Control Manager
Trend Micro Network VirusWall Enforcer protects your corporate network by ensuring that all devices comply with your corporate
security policy before entering your network. As an agentless NAC solution, it can scan any device—managed or unmanaged, local
or remote—for the most up-to-date security and critical Microsoft patches. Non-compliant devices are automatically quarantined
and sent through remediation. Once a device meets security requirements, it is allowed access to the network. Network VirusWall
Enforcer also filters network traffic to detect and block network worms—with zero false positives. The easy-to-manage appliance
isolates infected areas from the rest of the network so threats cannot spread.
Streamline administration of Trend Micro security solutions
with the latest version of Control Manager. This web-based
management console tracks security performance, reports
malware events and policy violations, and automates routine
tasks. New features include a customizable dashboard and
at-a-glance access to threat statistics from the Trend Micro
Smart Protection Network, Trend Micro's cloud-based
security infrastructure.
Advantages
Lowers security risks
Checks every device
Secures network traffic
Minimizes damage
Simplifies management
Block unknown
viruses.
Advantages
Reduce risks
Gain security insight and control
Lowers costs
Simplify security management
Minimize complexity
Create an integrated, centrally managed security
framework for a unified defense
Control Manager is available in two versions: Standard and Advanced
Trend Micro Control Manager
Users
Standard
Advanced
Web-based Centralized Security Management
Customizable Dashboard, Ad Hoc Query, Alerts
Trend Micro
Network VirusWall Enforcer
Smart Protection Network Threat Statistics
Quarantine
devices.
Visibility into Clients
Multi-Tiered Management
Customizable Reporting
License Management
Integrated Data Loss Prevention
Exchange
Advantages
Integrated Data Loss Prevention
Data protection capabilities integrated within traditional
enterprise security solutions, from endpoint to messaging
and network, simplify deployment, reduce infrastructure cost,
and provide peace-of-mind for data compliance
Central DLP policy management
Central configuration and application of pre-defined policy
templates across protection layers reduces initial and ongoing
administrative effort and provides consistent policy
enforcement enterprise-wide
Customizable, consolidated displays and reports
Aggregated logs, reports and dashboard views provide
real-time, enterprise-wide visibility into potential data
breaches and data policy violations
Security Management
Network Security
Trend Micro integrated DLP with central policy management
simplifies data protection across multiple layers of the
existing IT security infrastructure, streamlining administration
and providing more consistent enforcement to increase data
protection and compliance with little additional effort or cost.
SharePoint
Firewall
Internet
Trend Micro
Control Manager
Mail
Gateway
Web
Gateway
Endpoints
1. Centrally configure DLP policies
2. Centrally monitor DLP violation
=Trend Micro iDLP
22
23
Online Storage
Offline Security / USB Security
SafeSync for Enterprise
Portable Security
SafeSync for Enterprise enables larger companies to securely sync, share and manage documents, while also providing an
essential private cloud environment for IT to consolidate scattered documents in a controlled space.
With SafeSync for Enterprise, IT increases users agility and convenience, by allowing the distribution and access to large
documents whether in the office or on the road.
Trend Micro Portable Security is a new concept in antivirus
products designed for environments where installing antivirus
can be difficult - manufacturing environments, medical offices,
public institutions, or schools. Portable Security uses a USB
memory device to enable IT managers to scan and eliminate
viruses, whether you are linked to the internet or not.
Advantages
Access: Access all files from anywhere, at any time, and from any device, secured by centrally managed user access controls.
Share: Share files and folders instantly using secure shareable links, and use team folders to collaborate on files.
Sync: Sync files across every device used by team members to keep them safe and accessible even if computer or mobile
devices fail or get lost.
Advantages
Deploys rapidly and scales over time, no installation required
Functions via USB memory device, no installation required
Scans and removes viruses using the latest pattern files
Tracks your scanning practice -includes native log data
management
Can be updated via single management computer
Closed network environment
Trend Micro
Configure the scanning tool
and update the tool with the
latest virus pattern file
Active Update
Server
Get the
latest virus
pattern file
Scanning tool
Connect
Internet
Management
Computer
Manage log data
Trend Micro
Portable Security
Scan for viruses
and collect log data
Offline environment
Trend Micro USB Security
Trend Micro USB Security (TMUSB) is stored within the USB memory device, and is an antivirus solution which prevents virus
infection. Thus, even when USB memory devices connected to the devices or systems where anti-malware is not available,
TMUSB prevents malwares to travel from/to these devices.
Trend Micro
USB Security
Features & Advantages
Online Storage
Real-time scan of files on USB storage
Initial scan : scan the entire storage of USB storage
when it is inserted into a PC
Manual scan: scan the entire USB storage at the user's
convenience
Quarantine of detected viruses
(removal to a quarantined area)
Manual/automatic update of virus pattern files and
the virus scan engine
Various administrative functions for quarantine information
and log data
Installed in the USB storage
device, Trend Micro USB
Security performs a virus
scan on the data to ensure
that there is no contamination
from viruses
Quarantined area
If a virus is
detected, it will be
safely quarantined
in a storage area
of the USB
memory.
Offline Security / USB Security
This product is offered as embedded function in designated device distributed by selected vendors.
24
25
Services
Premium Support Program
Project Consulting Service
To help you fully leverage the value of your Trend Micro solutions and to achieve optimized IT service levels, you can rely on
Trend Micro Premium Support Program. Working as an extension to your team, Premium Support Program delivers a business
critical component of your IT security management program. You gain proactive security resources for customer advocacy and a
partner to help you optimize your security profile across technology, processes, and people.
Our Technical Account Managers (TAM) are security experts with extensive product knowledge, threat expertise, and access
across the Trend Micro ecosystem to help you get the most out of your Trend Micro investment.
With Trend Micro Project Consulting Services, your IT staff
can rely on a trusted advisor and partner to help meet your
company’s goals. Our experts have the insight and security
expertise needed to design the optimal architecture for
maximizing the effectiveness of your Trend Micro solutions.
Analyzing your security requirements and working closely
with your team, our experts will craft a detailed plan
specifically tailored to meet your needs.
Advantages
Proactive security services with regular touch points
Trusted security expertise that augments your team resources
Fully optimized security posture that reduces your risk exposure
SILVER
GOLD
PLATINUM
4 hours
2 hours
1 hours
24x7
24x7
24x7
Dedicated Technical Account Manager (TAM)
Response Time
Telephone Access to Support Engineers
ASSESS
PLAN
BUILD
MANAGE
Expert Services
Service Level and Feature Matrix
Description
Trend Micro Project Consulting Service
Trend Micro’s best-of-breed antivirus products enable an organization to cover messaging, Web, endpoint , and network security.
Expert-on-Guard (EoG) is a Trend Micro Expert Service that uses these products and technologies to proactively detect threats
and vulnerabilities that compromise the confidentiality, integrity, and availability of an organization’s data, applications, or
operating systems.
Remote Problem Diagnosis and Remediation Support
Proactive Threat Alerts
Access to Advanced Engineers
Priority Case Handling
Annual Proactive Security Planning
2-Hours SLA for Malware Support
Crisis Management Planning Assistance
Services
Services
Multi-Region Support Capabilities
26
27